Microlandhttp://microland.com
enHOW MANAGED SERVICES FOR INTERNET OF THINGS ARE TRANSFORMING THE INDUSTRIAL INTERNEThttp://microland.com/blog/how-managed-services-internet-things-are-transforming-industrial-internet
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-12-07T00:00:00+05:30">Thursday, December 7, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Coined as a term in 2012 by General Electric, the Industrial Internet of Things (IIoT) or simply, the industrial Internet, is estimated to be a <a href="http://iotindiamag.com/2017/08/ge-estimates-iiot-225-billion-market-2020/">$225 billion</a> worth industry by the year 2020<a href="#_ftn1" name="_ftnref1" title="" id="_ftnref1"><sup>[1]</sup></a>. With a range of technology-based innovations including driverless (or autonomous driving) vehicles, along with centralized monitoring of these smart cars, IIoT is driving major innovations in the manufacturing industries, including the automobile industry.</p>
<p><strong>Advantages of IIoT </strong></p>
<p>When it comes to automation systems in any industrial or manufacturing facilities, manufacturing companies are constantly looking for operational excellence which includes lower production downtime, lower production costs, and increased efficiency, among other benefits. This can be achieved with the use of the IIoT, which combines smart manufacturing technology with information technology to make the production process more dynamic and cost effective, along with being more responsive to changing market demands.</p>
<p>With a connected network of intelligent machines, Industrial IoT is much more than simply IoT used in industries. While IoT offers personal convenience through its adoption in consumer devices such as smart refrigerators and heart monitoring devices, adoption of IIoT is proving to be more real-time and critical to a range of industrial processes, particularly in instances of any failure or downtime.</p>
<p><strong>Significance of IIoT in the modern world</strong></p>
<p>According to the IIoT spending forecasts released by IDC, the following 3 industries are expected to make the most investments in IIoT technology<a href="#_ftn2" name="_ftnref2" title="" id="_ftnref2"><sup>[2]</sup></a></p>
<ul><li><em>Manufacturing industry</em>, which accounted for an investment of $102.5 billion in the year 2016.</li>
<li><em>Transportation and logistics industry</em>, with an estimated investment of $78 billion, is likely to be a key contributor to IIoT, along with the development of a connected logistics system.</li>
<li><em>Energy and Utilities industry</em>, mainly comprising of the oil &amp; gas and the smart power grid sector, and accounting for a 2016 investment of $57.8 billion.</li>
</ul><p style="margin-left:2.25pt;">As an example, the IIoT-powered Asset Performance Management from GE Digital has enabled the power generation company, Salt River Project (SRP) in reducing their costs by $0.5 million annually.<a href="#_ftn3" name="_ftnref3" title="" id="_ftnref3"><sup>[3]</sup></a></p>
<p>Apart from the above main industry sectors, IIoT technology also holds promise in other industries including healthcare, aviation, robotics, and mining.</p>
<p><strong>How IIoT enables seamless integration among modern equipment</strong></p>
<p>While IIoT is being projected as an emerging technology, most of the technologies that are needed to enable IIoT is already in existence, and does not require any major technology breakthrough. These include technologies such as intelligent sensors, connected (wired or wireless) networks, big data and analytics, along with cloud computing platforms.</p>
<p>For deriving maximum business value from the adoption of IIoT, manufacturing companies face the challenge of being able to acquire and integrate the individual components, needed to successfully deploy an IIoT solution.</p>
<p>The emergence of Managed Service Providers (MSP) has enabled the widespread use of IIoT through service-based solutions aimed at front-end deployment, administering of manufacturing operations, along with identifying the right components for a specific business objective or case study.</p>
<p><strong>Components of IIoT</strong></p>
<p>The IIoT system primarily consists of the following four components, namely:</p>
<ul><li>Intelligent assets</li>
</ul><p style="margin-left:.5in;">This includes a variety of physical assets including sensors, motors, and other instruments, which provide valuable business data. Intelligent assets can generate data of business value, which can then be shared across the manufacturing value chain.</p>
<ul><li>Data communication infrastructure</li>
</ul><p style="margin-left:.5in;">In order to handle the massive data generated by intelligent assets, data communication infrastructure between the assets is a vital component. Data networking technologies such as IEEE 802, Wi-Fi, and cloud-based connectivity are key elements towards enabling this component.</p>
<ul><li>Analytics</li>
</ul><p style="margin-left:.5in;">This is the IIoT component that converts the data into knowledge. Analytics tools such as predictive analytics enabled the creation of insightful business information, which can lead to innovative business models.</p>
<ul><li>People</li>
</ul><p style="margin-left:.5in;">Even with the advent of machine learning and data analytics, people are a critical component of IIoT to write the correct algorithm to enable each of the above components. Additionally, business executives are also needed to make business decisions, based on the intelligent information generated by IIoT.</p>
<p><strong>About Managed Service Providers in the IIoT space</strong></p>
<p>While the industrial benefits of adopting IoT technology are clear, most manufacturing companies face major challenges in the actual implementation of the right IoT-based solution aimed at specific business outcomes. So, in order to build a IoT-based solution using a combination of IIoT components supplied from different vendors, Managed Service Providers (MSPs) are providing the necessary skills to evaluate, acquire, integrate, and deploy IIoT-based solutions. For example, Microsoft is optimizing its Azure cloud platform for enabling IIoT-centric device management.</p>
<p>According to a recent survey conducted by Techanalysis Research, information technology (or IT) projects comprised of only 33% of the IoT projects in small to medium business enterprises, while the remaining 67% of the projects were centred around manufacturing, operations, line-of-business, and business strategy-centric projects.<a href="#_ftn4" name="_ftnref4" title="" id="_ftnref4"><sup>[4]</sup></a></p>
<p>With the IoT managed services market expected to grow from a market value of $21.85 billion in the year 2016 to $79.6 billion (by the year 2021) at a CAGR of 29.5% annually<a href="#_ftn5" name="_ftnref5" title="" id="_ftnref5"><sup>[5]</sup></a>, MSPs provide services at each level of the IoT ecosystem including the device management, connectivity, analytics, and IoT professionals to deploy a successful IoT solution.</p>
<p>As an IOT service provider, MSPs can provide a variety of capabilities, including:</p>
<ul><li>Developing and deploying a scalable value-added platform, which can derive valuable insights from the generated data.</li>
<li>Selecting or building an IoT-enabled cloud platform to manage their service offerings.</li>
<li>Defining a partnership-based ecosystem, particularly for specialized vertical markets or service offerings.</li>
<li>Implementing large-scale IoT offerings that can be closely integrated with legacy systems and future data sets to derive maximum Return on Investment for the business</li>
<li>Factory and Business interconnect services AKA known as “Factory Connectivity” services to establish a real time connectivity between shop floor machines and IIoT platform.</li>
</ul><p>When compared to other IT solution providers, IIoT MSPs need to partner with manufacturers to expand their offerings over (and above) traditional IT products or solutions towards the purpose of building and managing industrial automation systems. This could include modifying a device’s embedded operating system or offering remote monitoring and management products.</p>
<p><strong>Smart Manufacturing using IIoT</strong></p>
<p>IIoT-based technologies can drive the emergence of smart manufacturing with the following distinct operational environments:</p>
<ul><li><strong>Smarter enterprise control</strong></li>
</ul><p style="margin-left:.5in;">Closer integration of connected machines and manufacturing assets will facilitate flexibility and efficiency, resulting in manufacturing with higher profits. Smarter enterprise control benefits manufacturing through the elimination of enterprise silos. The networking of the production systems with ERP systems, PLM systems, and supply chain management systems will provide an efficient holistic view of the manufacturing processes.</p>
<ul><li><strong>Asset performance management</strong></li>
</ul><p style="margin-left:.5in;">The deployment of effective tools for asset performance management such as cost-efficient wireless sensors and cloud connectivity tools will enable efficient data gathering from the field of operation, resulting in an informed decision-making process. The growth of wireless connectivity and cloud solutions has eliminated the limitations of physical cable connectivity, thus enabling real-time decision support and remote monitoring.</p>
<ul><li><strong>Augmented operators</strong></li>
</ul><p style="margin-left:.5in;">Following the retirement of the baby boomer generation, younger workers in the manufacturing space will increasingly depend on personal devices for critical information. Employees of the future will augment the use of mobile devices and augmented reality to improve their productivity. With this delivery mode of real-time manufacturing-related data, manufacturing facilities will evolve into becoming more user-centric and less machine-centric.</p>
<p><strong>Conclusion</strong></p>
<p>Thanks to its tremendous benefits, IIoT-based technologies will continue to be adopted as a means of maximising revenues and productivity by manufactures from different industries. According to industry estimates, around 46% of the global economy is expected to benefit from Industrial Internet.<a href="#_ftn6" name="_ftnref6" title="" id="_ftnref6"><sup>[6]</sup></a> With an estimated 30 billion devices likely to be connected to the Internet by the year 2020, enterprises and service providers will also need to address risk factors associated with the rise of IoT, including privacy concerns and cybersecurity measures.</p>
<p>Along with the business value of IIoT for manufacturing enterprises, today’s professionals also need to equip themselves with knowledge and skills of IIoT to maximize its complete potential and benefits.</p>
<p><b>References:</b></p>
<div>
<p><a href="#_ftnref1" name="_ftn1" title="" id="_ftn1">[1]</a> <a href="http://iotindiamag.com/2017/08/ge-estimates-iiot-225-billion-market-2020/">http://iotindiamag.com/2017/08/ge-estimates-iiot-225-billion-market-2020/</a></p>
<p><a href="#_ftnref2" name="_ftn2" title="" id="_ftn2">[2]</a> <a href="https://www.i-scoop.eu/internet-of-things-guide/iot-spending-2020/">https://www.i-scoop.eu/internet-of-things-guide/iot-spending-2020/</a></p>
<p><a href="#_ftnref3" name="_ftn3" title="" id="_ftn3">[3]</a> <a href="https://www.ge.com/digital/asset-performance-management">https://www.ge.com/digital/asset-performance-management</a></p>
<p><a href="#_ftnref4" name="_ftn4" title="" id="_ftn4">[4]</a> <a href="http://www.technalysisresearch.com/downloads/Enterprise%20IOT%20Survey%20Summary%20Report.pdf">http://www.technalysisresearch.com/downloads/Enterprise%20IOT%20Survey%2...</a></p>
<p><a href="#_ftnref5" name="_ftn5" title="" id="_ftn5">[5]</a> <a href="http://www.marketsandmarkets.com/Market-Reports/iot-managed-services-market-256294760.html">http://www.marketsandmarkets.com/Market-Reports/iot-managed-services-mar...</a></p>
<p><a href="#_ftnref6" name="_ftn6" title="" id="_ftn6">[6]</a> <a href="https://www.ge.com/docs/chapters/Industrial_Internet.pdf">https://www.ge.com/docs/chapters/Industrial_Internet.pdf</a></p>
</div>
<style type="text/css">
<!--/*--><![CDATA[/* ><!--*/
.content .node-content .node h2.title, .page-title {
display: block;
font-size: 28px;
margin: 20px auto 0;
max-width: 1024px;
text-transform: none;
font-weight: bold;
color: #8BAAD9;
line-height: 32px;
padding-bottom: 15px;
}
/*--><!]]>*/
</style></div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_1">
</span>
<script type="text/javascript">
<!--//--><![CDATA[//><!--
if(window.da2a)da2a.script_load();
//--><!]]>
</script></span></li>
</ul>Thu, 07 Dec 2017 09:25:22 +0000Manjanath Nayak2348 at http://microland.comhttp://microland.com/blog/how-managed-services-internet-things-are-transforming-industrial-internet#commentsWebinar - NO-SIZE-FITS-ALL! AN APPLICATION-DOWN APPROACH FOR YOUR CLOUD TRANSFORMATIONhttp://microland.com/events/webinar-no-size-fits-all-application-down-approach-your-cloud-transformation
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-11-15T00:00:00+05:30">November 15, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><div id="content">
<section id="post-content" role="main">
<div class="region region-content">
<div class="block block-system" id="block-system-main">
<div class="content"><span class="submitted"><span content="2017-10-11T15:56:49+05:30" datatype="xsd:dateTime" property="dc:date dc:created" rel="sioc:has_creator">Submitted by <a about="/users/mladmin" class="username" datatype="" href="/users/mladmin" property="foaf:name" title="View user profile." typeof="sioc:UserAccount" xml:lang="">mladmin</a> on October 11, 2017 - 15:56</span></span>
<div class="content node-events">
<div class="field field-name-field-date field-type-datetime field-label-hidden">
<div class="field-items">
<div class="field-item even"><strong>Speakers:</strong></div>
</div>
</div>
<div class="field field-name-body field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even" property="content:encoded">
<p>Aaron Goldberg – CEO, Content 4 IT<br />
Satadeep Mitra – Practice Head, Application Management services, Microland<br />
Benil George P J – Practice Head, Cloud Services, Microland</p>
<p><span style="color:#f47e20;"><strong>EVENT OVERVIEW</strong></span></p>
<p>Over time, organizations tend to invest in more and more applications, usually for sound business reasons. Today, approximately 65 to 70% of all application costs are spent on maintenance and support. With cloud as a business imperative to achieve agility and contain costs, many organizations are re-assessing their application landscapes to make them cloud compatible.</p>
<p>In order to take advantage of a cloud strategy, however, IT organizations need to know if their applications are capable of running securely in the cloud, or that the business value provided by an application is worth the investment to move it to the cloud.</p>
<p>This webinar will explore:<br />
&nbsp; &nbsp; &nbsp; - An application down view of cloud transformation initiatives<br />
&nbsp; &nbsp; &nbsp; - The benefits of adopting customized approaches in context to your application landscape maturity.<br />
&nbsp; &nbsp; &nbsp; - Lessons from working with future-ready organizations, who have implemented such approaches to realize business value.</p>
<style type="text/css">.node-events .field-name-field-speaker-image { float: left; height: 150px; padding-right: 15px; } .node-events .field-name-field-speaker-name{ font-weight:bold; } .node-events .field-name-field-speaker-designation { padding-bottom: 5px; font-size: 13px; } .node-events .field-name-field-speaker-image img{ border: 1px solid; } .node-events .field-name-field-speaker-profiles .field-label{ color:#f47e20; }
</style>
</div>
</div>
</div>
<div class="field-collection-container clearfix">
<div class="field field-name-field-speaker-profiles field-type-field-collection field-label-above">
<div class="field-label">SPEAKER PROFILES:&nbsp;</div>
<div class="field-items">
<div class="field-item even">
<div class="field-collection-view clearfix view-mode-full">
<div about="/field-collection/field-speaker-profiles/3" class="entity entity-field-collection-item field-collection-item-field-speaker-profiles clearfix" typeof="">
<div class="content">
<div class="field field-name-field-speaker-image field-type-image field-label-hidden">
<div class="field-items">
<div class="field-item even"><img alt="" height="100" src="http://s3.amazonaws.com/development.microland.com/s3fs-public/styles/thumbnail/public/Satadeep-Mitra.png?itok=AQGVBRQ4" typeof="foaf:Image" width="100" /></div>
</div>
</div>
<div class="field field-name-field-speaker-name field-type-text field-label-hidden">
<div class="field-items">
<div class="field-item even"><a href="mailto:SatadeepM@microland.com" style="color:#818182">Satadeep Mitra</a></div>
</div>
</div>
<div class="field field-name-field-speaker-designation field-type-text field-label-hidden">
<div class="field-items">
<div class="field-item even">Practice Head, Application Management services, Microland</div>
</div>
</div>
<div class="field field-name-field-speaker-intro field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p>Satadeep has over 15 years of experience in the IT services industry, spanning various multinational conglomerates. At Microland, he heads the applications business and has been key in shaping next gen services focusing on competencies, capabilities, partnerships and assets.</p>
</div>
</div>
</div>
</div>
</div>
<div about="/field-collection/field-speaker-profiles/3" class="entity entity-field-collection-item field-collection-item-field-speaker-profiles clearfix" typeof="">
<div class="content">
<div class="field field-name-field-speaker-image field-type-image field-label-hidden">
<div class="field-items">
<div class="field-item even"><img alt="" height="100" src="http://s3.amazonaws.com/development.microland.com/s3fs-public/styles/thumbnail/public/benil.png?itok=zwOKuALk" typeof="foaf:Image" width="100" /></div>
</div>
</div>
<div class="field field-name-field-speaker-name field-type-text field-label-hidden">
<div class="field-items">
<div class="field-item even"><a href="mailto:BenilGPJ@microland.com " style="color:#818182">Benil George P J</a></div>
</div>
</div>
<div class="field field-name-field-speaker-designation field-type-text field-label-hidden">
<div class="field-items">
<div class="field-item even">Practice Head, Cloud Services, Microland</div>
</div>
</div>
<div class="field field-name-field-speaker-intro field-type-text-with-summary field-label-hidden">
<div class="field-items">
<div class="field-item even">
<p>An industry veteran for more than 20 years and a certified AWS, Azure and ITIL<sup>®</sup> V3 (Expert), Benil comes with rich expertise in Cloud technologies.At Microland, he has been pivotal in building their Cloud business and has conceptualised and built Microland's Public Cloud services.</p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="block block-block contextual-links-region" id="block-block-412">
<div class="content">
<p><a class="exp_btn" href="http://event.on24.com/wcc/r/1541439-1/F6EE7F9229F614B72B1D70F44BAEAA3A?partnerref=CL111517MIC01" target="_blank">REGISTER NOW</a></p>
<style type="text/css">.exp_btn{ padding: 10px 15px; background: #f47e20; color: white; font-size: 16px; } .date-display-remaining{display:none;}
</style>
</div>
</div>
</section>
</div>
</div></div></div>Mon, 13 Nov 2017 11:50:20 +0000mladmin2347 at http://microland.comhttp://microland.com/events/webinar-no-size-fits-all-application-down-approach-your-cloud-transformation#commentsTOP 10 THINGS TO KNOW WHEN DEPLOYING MICROSOFT ENTERPRISE MOBILITY + SECURITY (EMS)http://microland.com/top-10-things-know-when-deploying-microsoft-enterprise-mobility-security-ems-0
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Among the products available in the market for Enterprise Mobility Management (EMM), Microsoft’s Enterprise Mobility + Security (EMS) offers a good suite of management capabilities for mobile landscapes. However, integrating Microsoft EMS with the current enterprise IT setup involves the following - Navigating the challenges of setting up Active Directory and Conditional Access, Setting up the right data protection policies, Understanding exactly what Microsoft EMS capabilities and restrictions are during the planning phase</p>
<div class="pdf-icon"><a href="top-10-things-know-when-deploying-microsoft-enterprise-mobility-security-ems" target="_blank"><img alt="Cloud Service PDF Icon" class="diagonostic-img" src="http://contents.microland.com/images/download-icon.jpg" /> Download</a></div>
</div></div></div><div class="field field-name-field-view-report field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">View Report</div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_2">
</span>
</span></li>
</ul>Fri, 10 Nov 2017 13:51:15 +0000mladmin2346 at http://microland.comhttp://microland.com/top-10-things-know-when-deploying-microsoft-enterprise-mobility-security-ems-0#commentsTop 10 Things to know when deploying Microsoft Enterprise Mobility + Security (EMS)http://microland.com/top-10-things-know-when-deploying-microsoft-enterprise-mobility-security-ems
<div class="field field-name-field-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>Thank you for your interest. Please submit the form below to download the requested file.</p>
</div></div></div><form class="webform-client-form webform-client-form-2345" enctype="multipart/form-data" action="/rss.xml" method="post" id="webform-client-form-2345" accept-charset="UTF-8"><div><div class="form-item webform-component webform-component-textfield webform-component--name">
<label class="element-invisible" for="edit-submitted-name">Name <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Name*" type="text" id="edit-submitted-name" name="submitted[name]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<div class="form-item webform-component webform-component-email webform-component--email-id">
<label class="element-invisible" for="edit-submitted-email-id">Email Id <span class="form-required" title="This field is required.">*</span></label>
<input required="required" class="email form-text form-email required" placeholder="Business Email Id*" type="email" id="edit-submitted-email-id" name="submitted[email_id]" size="60" />
</div>
<div class="form-item webform-component webform-component-textfield webform-component--designation">
<label class="element-invisible" for="edit-submitted-designation">Designation <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Designation*" type="text" id="edit-submitted-designation" name="submitted[designation]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<div class="form-item webform-component webform-component-textfield webform-component--company">
<label class="element-invisible" for="edit-submitted-company">Company <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Company Name*" type="text" id="edit-submitted-company" name="submitted[company]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<input type="hidden" name="details[sid]" />
<input type="hidden" name="details[page_num]" value="1" />
<input type="hidden" name="details[page_count]" value="1" />
<input type="hidden" name="details[finished]" value="0" />
<input type="hidden" name="form_build_id" value="form-2aopGsQ0VFGFwimkWSdlbyfIq0xINWa-J09c7c-IUoI" />
<input type="hidden" name="form_id" value="webform_client_form_2345" />
<div class="form-actions"><input class="webform-submit button-primary form-submit" type="submit" name="op" value="Submit" /></div></div></form>Fri, 10 Nov 2017 13:46:19 +0000mladmin2345 at http://microland.comhttp://microland.com/top-10-things-know-when-deploying-microsoft-enterprise-mobility-security-ems#commentsAZURE SECURITY CENTERhttp://microland.com/azure-security-center-0
<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>The number of enterprises moving their workloads onto cloud is on the rise, given the flexibility and inherent advantages of cloud and its impact on business efficiencies. However due to the number of services hosted and updates being released regularly, cloud environments have become more vulnerable. The Azure Security Center, offered as service in the Azure cloud, provides a reliable answer to these technical blockades on the security front.</p>
<div class="pdf-icon"><a href="azure-security-center" target="_blank"><img alt="Cloud Service PDF Icon" class="diagonostic-img" src="http://contents.microland.com/images/download-icon.jpg" /> Download</a></div>
</div></div></div><div class="field field-name-field-view-report field-type-text field-label-hidden"><div class="field-items"><div class="field-item even">View Report</div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_3">
</span>
</span></li>
</ul>Fri, 10 Nov 2017 13:42:28 +0000mladmin2344 at http://microland.comhttp://microland.com/azure-security-center-0#commentsAZURE SECURITY CENTERhttp://microland.com/azure-security-center
<div class="field field-name-field-body field-type-text-long field-label-hidden"><div class="field-items"><div class="field-item even"><p>Thank you for your interest. Please submit the form below to download the requested file.</p>
</div></div></div><form class="webform-client-form webform-client-form-2343" enctype="multipart/form-data" action="/rss.xml" method="post" id="webform-client-form-2343" accept-charset="UTF-8"><div><div class="form-item webform-component webform-component-textfield webform-component--name">
<label class="element-invisible" for="edit-submitted-name--2">Name <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Name*" type="text" id="edit-submitted-name--2" name="submitted[name]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<div class="form-item webform-component webform-component-email webform-component--email-id">
<label class="element-invisible" for="edit-submitted-email-id--2">Email Id <span class="form-required" title="This field is required.">*</span></label>
<input required="required" class="email form-text form-email required" placeholder="Business Email Id*" type="email" id="edit-submitted-email-id--2" name="submitted[email_id]" size="60" />
</div>
<div class="form-item webform-component webform-component-textfield webform-component--designation">
<label class="element-invisible" for="edit-submitted-designation--2">Designation <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Designation*" type="text" id="edit-submitted-designation--2" name="submitted[designation]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<div class="form-item webform-component webform-component-textfield webform-component--company">
<label class="element-invisible" for="edit-submitted-company--2">Company <span class="form-required" title="This field is required.">*</span></label>
<input required="required" placeholder="Company Name*" type="text" id="edit-submitted-company--2" name="submitted[company]" value="" size="60" maxlength="128" class="form-text required" />
</div>
<input type="hidden" name="details[sid]" />
<input type="hidden" name="details[page_num]" value="1" />
<input type="hidden" name="details[page_count]" value="1" />
<input type="hidden" name="details[finished]" value="0" />
<input type="hidden" name="form_build_id" value="form-LP4O_eZa9-nAhsvSp9yT2_Ha01XiCM5wcfRPbAG2Dtk" />
<input type="hidden" name="form_id" value="webform_client_form_2343" />
<div class="form-actions"><input class="webform-submit button-primary form-submit" type="submit" name="op" value="Submit" /></div></div></form>Fri, 10 Nov 2017 13:31:18 +0000mladmin2343 at http://microland.comhttp://microland.com/azure-security-center#commentsRansomware - Pirates of the World Wide Web http://microland.com/blog/ransomware-pirates-world-wide-web
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-11-09T00:00:00+05:30">Thursday, November 9, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>In the last few years, the IT landscape has changed dramatically. Cybersecurity threats are ubiquitous and it is not something that is going to go away. We hear new stories every day in which a ransomware or virus has hit an organization, paralyzing its systems and causing damage to its reputation, revenues and trust. A good example was the recent ransomware attack by the name WannaCrypt which infected many industries and left them paralyzed. As per security analysts, such monster ransomwares are going to double or triple in the coming years and are likely to keep IT security on top of the pyramid for many organizations.</p>
<p>With the latest innovations in the world of technology, we are now able to deliver desktops just-in-time from an on-premise datacenter or through the cloud. Such dynamic desktops can be provisioned with latest applications, software updates and security patches within no time. Data can be recovered from any point-in-time backup stored offsite and wipe and spin new desktops in an event of Ransomware / Virus attack, all in a matter of minutes. But what about those littered legacy windows desktop environments that have not been moved into cloud or datacenter due to various reasons. How will you secure and manage them or will just backing up the user data save you? What will you do if you are hit by a monster attack such as WannaCrypt which not only affects the data but locks down the PC . Are you prepared to handle such attacks for your legacy desktop environment? How do you mitigate the risk for legacy environment?</p>
<p>Bring the power of layering technology to legacy environment. Layering technology mitigates the key risks of an attack such as:</p>
<ol><li value="NaN">Reducing the attack surface</li>
<li value="NaN">Security &amp; patch updates</li>
<li value="NaN">Backup and restore availability</li>
</ol><p>Layering technologies allows the IT teams to apply or provision up-to-date layer of operating system and application layers. This all happens in the background and the users are negligibly impacted. The required layers are downloaded quietly in the background and the user is prompted for a restart once done. After the restart, the endpoint is up-to-date with the latest operating system and updated applications. Layering solutions also provides ability to store full desktop snapshot of that user in the datacenter with continual changes by the IT or by the end user themselves, thus making it possible to do a full, partial or point-in-time system restore when needed.</p>
<p>Compared to other backup software which just allows you to restore files and in the case of system lock due to virus or ransomware or system corruption, you are left with only one choice and i.e. to reimage and copy the files back to the endpoint. On the other hand, layering allows you to just restore to specific point before the endpoint was hit by a ransomware or virus thus removing the risk from file’s and operating system as well.</p>
<p>What if the endpoint is not booting? Not to worry, since layering allows you to do a full endpoint restore using a bootable disk. That’s cool, right? Imagine the amount of time you would save when you have hundreds of endpoints that needs to be restored. And to top it, all of this is centrally managed and monitored.</p>
<p>At Microland, we help enterprises transform their legacy IT, secure their information and remediate technology debt in end user services. Remember the IT landscape is all the time shifting, and prevention works better than cure at least in the world of cyber-security. </p>
</div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_4">
</span>
</span></li>
</ul>Thu, 09 Nov 2017 14:19:21 +0000Abhishek G H2342 at http://microland.comhttp://microland.com/blog/ransomware-pirates-world-wide-web#commentsGearing up for a truly Unified Endpoint Management systemhttp://microland.com/blog/gearing-truly-unified-endpoint-management-system
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-11-09T00:00:00+05:30">Thursday, November 9, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>For decades Microsoft System Center Configuration Manager (SCCM) have helped enterprises manage hundreds or thousands of systems including asset management and security management solutions. But of late, enterprise users are no longer confined to desktops and laptops, but also smartphones, tablets and other mobile devices. To address this need, there has been a separate category of solutions such as EM+S, Airwatch and XenMobile – called Enterprise Mobility Management (EMM). We believe that enterprises need to start preparing for a convergence of these two categories of solutions soon. </p>
<p>Already a host of features on EMM solutions require parallel configuration changes in Microsoft SCCM or AD servers. Also, EMM solutions have not entirely matured and have challenges given the multitude of devices and OS versions that they need to support. But the direction of travel seems to be clear as Microsoft released Windows 10 in a Software-as-a-Service model as an evergreen Windows feature (always up-to-date). </p>
<p>Eventually enterprise IT managers would see that they are performing similar activities on two families of devices (desktops/laptops running Windows OS/MacOS, mobile devices running Android/iOS) – security updates, provisioning/deprovisioning, pushing apps etc. It is but reasonable to expect Microsoft as well as other solution providers to converge these products into a single platform. And that would be truly ‘Unified Endpoint Management’.</p>
<p>What about Internet of Things? This paradigm doesn’t change much for IoT devices, or does it? One would expect that current EMM vendors would include support for IoT protocols as well soon (e.g. Citrix’s acquisition of Octoblu) and bring them under the single umbrella of ‘endpoints’ to be managed. Please don’t be surprised if your coffee machine / board room AV systems are activated when they detect your presence. At that point, they will no longer be run by the building facilities manager, but by your enterprise IT using their ‘Unified Endpoint Management’ platform.</p>
</div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_5">
</span>
</span></li>
</ul>Thu, 09 Nov 2017 14:17:31 +0000Gokulakrishnan S2341 at http://microland.comhttp://microland.com/blog/gearing-truly-unified-endpoint-management-system#commentsMicroland App is a Super App!http://microland.com/blog/microland-app-super-app
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-11-08T00:00:00+05:30">Wednesday, November 8, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>Today was handstand day at class and I was the only one who couldn’t get my legs straight up without a helping hand! Like the strong hands of Superman to keep me steady upside down.</p>
<p>But what was super was how the Microland<span style="color:#ed1c24">One</span> app came to my help last Friday.</p>
<p>Ashish and I were to travel together to MDI Gurgaon for the summer placements. It was an early morning flight. As I reached the airport, I longed for a cup of hot coffee. After all, starting at 4 am does leave one groggy and I was longing for an energy burst.</p>
<p>I decided to call Ashish to check how far he was away from the airport. And oops, that’s when I realized I didn’t have his number. I thought of SMSing my colleague, Venu but visions of a grumpy sleep deprived face, mouthing garbled profanities and clubbing me at close quarters made me abandon that idea. Who else should I call at this unearthly hour for a mobile number?</p>
<p>As my mind wandered through random possibilities, all of which had injurious endings, as far as I was concerned, I noticed a message alert from the app! I ignored it the first time. I got a second alert and it said, “Hello, this is 96******25. Have you reached the airport?! “. I was stumped for a second. Did I just become a number for the app? Or was I some kind of a binary code for my handheld? Was this like some kind of telepathy going on? Could the app read my mind and trigger an alert to Ashish? Seriously could it? Like the sci-fi android, I could see my hand-held android morphing into a mind reading Superman! Maybe that is what it became, because soon enough Ashish and I connected and realized we weren’t more than 10 feet away from each other at the airport lounge. The app did what my groggy eyes couldn’t do that morning. Happy to see you 96******25.!</p>
<p>Ashish located. Ashish contacted. Ashish connected.</p>
<p>It was a fun cup of coffee at the airport. All because Microland<span style="color:#ed1c24">One</span> came to my rescue. Wish it could teach me how to do handstands though…</p>
<p>I have a feeling that my wish may be granted sooner! What do you think? I think Superman app can do anything!</p>
<p>PS: Small episodes like these make you realize how handy the app is. Imagine if you were travelling to another country and you didn’t have any numbers saved. You could bail out just like how I did!</p>
<p>Kind of like Clark Kent minus the glasses, on your handheld!</p>
</div></div></div><ul class="links inline"><li class="addtoany first last"><span><span class="a2a_kit a2a_target addtoany_list" id="da2a_6">
</span>
</span></li>
</ul>Wed, 08 Nov 2017 08:28:16 +0000Purnima Menon2340 at http://microland.comhttp://microland.com/blog/microland-app-super-app#commentsMicroland appoints Robert Wysocki as Chief Technology Officerhttp://microland.com/press-release/microland-appoints-robert-wysocki-chief-technology-officer
<div class="field field-name-field-date field-type-datetime field-label-hidden"><div class="field-items"><div class="field-item even"><span class="date-display-single" property="dc:date" datatype="xsd:dateTime" content="2017-11-07T00:00:00+05:30">November 7, 2017</span></div></div></div><div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><a href="http://contents.microland.com/documents/press-releases/2017/Press-Release-Microland-appoints-Bob-Wysocki-ver-1-1.pdf" target="_blank">Read More &gt;</a></p>
</div></div></div>Tue, 07 Nov 2017 10:22:58 +0000mladmin2334 at http://microland.comhttp://microland.com/press-release/microland-appoints-robert-wysocki-chief-technology-officer#comments